Skip to main content
Erschienen in: Soft Computing 16/2017

22.06.2017 | Methodologies and Application

DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data

verfasst von: Lanxiang Chen, Linbing Qiu, Kuan-Ching Li, Wenbo Shi, Nan Zhang

Erschienen in: Soft Computing | Ausgabe 16/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rise of cloud computing, data owners outsource their data to public cloud servers while allowing users to search the data, aiming at greater flexibility and economic savings. For privacy considerations, private data must be encrypted before outsourcing, and this makes the method of plaintext keyword search infeasible. However, it is critical to enable encrypted data able to be searched. Considering the requirements of practical application scenarios, the function of efficient multi-keyword ranked search and similarity search based on relevance score is necessary for data users. There proposed a number of multi-keyword searchable encryption schemes to try to meet this demand. However, most existing schemes do not satisfy required dynamic update simultaneously. In this paper, a novel and efficient dynamic multi-keyword ranked search scheme improved from traditional secure kNN computation is proposed. The proposed scheme incorporates the similarity measure “coordinate matching” and “inner product similarity” to improve the relevance of search keywords to the relevant cloud files. A reverse data structure is introduced to allow users to perform dynamic operations on document collection, either inserting or deleting. The sparse matrix is used to replace the dense large-scale matrix in index encryption and query vector encryption to improve efficiency. Experiments show that the proposed scheme indeed reduces the overhead of computation and storage compared to MRSE scheme, concurrently guaranteeing privacy and efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233CrossRef Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233CrossRef
Zurück zum Zitat Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934CrossRef Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934CrossRef
Zurück zum Zitat Gajek S (2016) Dynamic symmetric searchable encryption from constrained functional encryption. In: Proceedings of the cryptographers’ track at the RSA conference, pp 75–89 Gajek S (2016) Dynamic symmetric searchable encryption from constrained functional encryption. In: Proceedings of the cryptographers’ track at the RSA conference, pp 75–89
Zurück zum Zitat Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of symposium on the theory of computing (STOC), pp 169–178 Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of symposium on the theory of computing (STOC), pp 169–178
Zurück zum Zitat Goh E-J (2003) Secure indexes. Cryptology ePrint Archive: Report 2003/216 Goh E-J (2003) Secure indexes. Cryptology ePrint Archive: Report 2003/216
Zurück zum Zitat Ishai Y, Kushilevitz E, Ostrovsky R, Sahai A (2006) Cryptography from anonymity. In: Proceedings of the 47th annual IEEE symposium on foundations of computer science, pp 239–248 Ishai Y, Kushilevitz E, Ostrovsky R, Sahai A (2006) Cryptography from anonymity. In: Proceedings of the 47th annual IEEE symposium on foundations of computer science, pp 239–248
Zurück zum Zitat Kiayias A, Oksuz O, Russell A, Tang Q, Wang B (2016) Efficient encrypted keyword search for multi-user data sharing. In: Proceedings of European symposium on research in computer security (ESORICS), pp 173–195 Kiayias A, Oksuz O, Russell A, Tang Q, Wang B (2016) Efficient encrypted keyword search for multi-user data sharing. In: Proceedings of European symposium on research in computer security (ESORICS), pp 173–195
Zurück zum Zitat Mashauri D, Li R, Han H, Gu X , Xu Z, Xu CZ (2015) Adaptive multi-keyword ranked search over encrypted cloud data. In: Proceedings of the international conference on collaborative computing: networking, applications and worksharing, pp 3–13 Mashauri D, Li R, Han H, Gu X , Xu Z, Xu CZ (2015) Adaptive multi-keyword ranked search over encrypted cloud data. In: Proceedings of the international conference on collaborative computing: networking, applications and worksharing, pp 3–13
Zurück zum Zitat Poon HT, Miri A (2015) An efficient conjunctive keyword and phase search scheme for encrypted cloud storage systems. In: Proceedings of IEEE 8th international conference on cloud computing, pp 508–515 Poon HT, Miri A (2015) An efficient conjunctive keyword and phase search scheme for encrypted cloud storage systems. In: Proceedings of IEEE 8th international conference on cloud computing, pp 508–515
Zurück zum Zitat Rane DD, Ghorpade VR (2015) Multi-user multi-keyword privacy preserving ranked based search over encrypted cloud data. In: Proceedings of the international conference on pervasive computing (ICPC), pp 1–4 Rane DD, Ghorpade VR (2015) Multi-user multi-keyword privacy preserving ranked based search over encrypted cloud data. In: Proceedings of the international conference on pervasive computing (ICPC), pp 1–4
Zurück zum Zitat Singhal A (2001) Modern information retrieval: a brief overview. IEEE Comput Soc Tech Comm Data Eng Bull 24(4):35–43 Singhal A (2001) Modern information retrieval: a brief overview. IEEE Comput Soc Tech Comm Data Eng Bull 24(4):35–43
Zurück zum Zitat Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings of IEEE symposium on security and privacy, pp 44–55 Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings of IEEE symposium on security and privacy, pp 44–55
Zurück zum Zitat Tang Q (2014) Nothing is for free: security in searching shared and encrypted data. IEEE Trans Inf Forensics Secur 9(11):1943–1952CrossRef Tang Q (2014) Nothing is for free: security in searching shared and encrypted data. IEEE Trans Inf Forensics Secur 9(11):1943–1952CrossRef
Zurück zum Zitat Wang C, Cao N, Li J, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479CrossRef Wang C, Cao N, Li J, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479CrossRef
Zurück zum Zitat Wang B, Yu S, Lou W, Hou YT (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings of IEEE conference on computer communications, pp 2112–2120 Wang B, Yu S, Lou W, Hou YT (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings of IEEE conference on computer communications, pp 2112–2120
Zurück zum Zitat Witten IH, Moffat A (1999) Managing gigabytes: compressing and indexing documents and images, second edition. Morgan Kaufmann Witten IH, Moffat A (1999) Managing gigabytes: compressing and indexing documents and images, second edition. Morgan Kaufmann
Zurück zum Zitat Wong WK, Cheung DW, Kao B, Mamoulis N (2009) Secure kNN computation on encrypted databases. In: Proceedings of ACM SIGMOD international conference on management of data, pp 139–152 Wong WK, Cheung DW, Kao B, Mamoulis N (2009) Secure kNN computation on encrypted databases. In: Proceedings of ACM SIGMOD international conference on management of data, pp 139–152
Zurück zum Zitat Xhafa F, Wang J, Chen X, Krause PJ (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef Xhafa F, Wang J, Chen X, Krause PJ (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef
Zurück zum Zitat Xia Z, Chen L, Sun X, Liu J (2016) A multi-keyword ranked search over encrypted cloud data supporting semantic extension. Int J Multimed Ubiquitous Eng 11(8):107–120CrossRef Xia Z, Chen L, Sun X, Liu J (2016) A multi-keyword ranked search over encrypted cloud data supporting semantic extension. Int J Multimed Ubiquitous Eng 11(8):107–120CrossRef
Zurück zum Zitat Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef
Zurück zum Zitat Yang C, Zhang W, Xu J, Xu J, Yu N (2012) A fast privacy-preserving multi-keyword search scheme on cloud data. In: Proceedings of the international conference on cloud and service computing (CSC), pp 104–110 Yang C, Zhang W, Xu J, Xu J, Yu N (2012) A fast privacy-preserving multi-keyword search scheme on cloud data. In: Proceedings of the international conference on cloud and service computing (CSC), pp 104–110
Zurück zum Zitat Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262–267CrossRef Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262–267CrossRef
Zurück zum Zitat Zhangjie F, Sun X, Qi Liu L, Zhou JS (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200 Zhangjie F, Sun X, Qi Liu L, Zhou JS (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200
Zurück zum Zitat Zhang W, Xiao S, Lin Y, Zhou T, Zhou S (2014) Secure ranked multi-keyword search for multiple data owners in cloud computing. In: Proceedings of the 44th annual IEEE/IFIP international conference on dependable systems and networks, pp 276–286 Zhang W, Xiao S, Lin Y, Zhou T, Zhou S (2014) Secure ranked multi-keyword search for multiple data owners in cloud computing. In: Proceedings of the 44th annual IEEE/IFIP international conference on dependable systems and networks, pp 276–286
Metadaten
Titel
DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data
verfasst von
Lanxiang Chen
Linbing Qiu
Kuan-Ching Li
Wenbo Shi
Nan Zhang
Publikationsdatum
22.06.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 16/2017
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-017-2684-6

Weitere Artikel der Ausgabe 16/2017

Soft Computing 16/2017 Zur Ausgabe